Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer
Reexamination Certificate
1998-06-22
2001-04-17
Hayes, Gail (Department: 2131)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Protection at a particular protocol layer
C713S168000, C714S821000
Reexamination Certificate
active
06219791
ABSTRACT:
FIELD OF THE INVENTION
This invention relates in general to the generation and verification of encrypted data packets and, in particular, to the verification of encrypted data packets without redundant hardware or software.
BACKGROUND OF THE INVENTION
Many communications systems benefit from secure communications provided by encrypted digital data packets. In prior art secure communications systems redundant encryption circuits have been employed to ensure that unencrypted data is not inadvertently transmitted. Encrypted data packets from the redundant encryption circuits are compared, and if they do not match, then an error has been detected, and transmission can be stopped.
This prior art scheme requires that redundant hardware or software be employed. When redundant hardware or software is employed for verification, errors are only found when the redundant functions do not behave identically. If a design flaw exists in either the redundant hardware or software, then identical errors will be produced in the redundant circuits and the error will go undetected.
Other prior art systems decrypt the encrypted data packets and compare the resulting decrypted data packets with the original unencrypted data packets. In secure communications systems, it is undesirable to maintain unencrypted data packets because this increases the possibility of a breach in security. This prior art scheme involving decrypting and comparing to the original data packet is undesirable because the original, unencrypted data packet must be maintained for purposes of comparison.
What is needed is a method and apparatus for encrypting data packets, and for verifying the proper encryption of data packets, without using redundant hardware or software. Also what is needed is a method and apparatus for encrypting and verifying the resulting encrypted data packets without maintaining an unencrypted version of the data packets.
REFERENCES:
patent: 4760599 (1988-07-01), Okamoto et al.
patent: 5016276 (1991-05-01), Matumoto et al.
patent: 5365591 (1994-11-01), Carsell et al.
patent: 5432848 (1995-07-01), Butter et al.
patent: 5608798 (1997-03-01), Likens et al.
patent: 5631960 (1997-05-01), Likens et al.
patent: 5991401 (1999-11-01), Daniels et al.
patent: 6009174 (1999-12-01), Tatebayashi et al.
Menezes et al. Handbook of Applied Cryptography. Oct. 1996. pp. 359-368.
Blanchard Scott David
Heuvel Dean Paul Vanden
Hayes Gail
Jones Maurice J.
Klekotka James E.
Latham Bryan
LeMoine Dana B.
LandOfFree
Method and apparatus for generating and verifying encrypted... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus for generating and verifying encrypted..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for generating and verifying encrypted... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2496410